Networks 2 Part 3 Prepared by: Dr. Raed Qadi & Dr. Manar Qamhieh The content of these slides is collected from various sources (books, websites and author pages), no originality is claimed 1 Course Outline ● Wide Area Networks (WANs) ○ ○ ○ ● ● Framing Virtual LANs (VLANs) Ethernet/ Optical Fiber Cisco routing and Access Lists Exterior Gateway Protocols CDMA / WiFi Bluetooth and WiMAX Cellular Networks and Mobile IP 802.15.14: Zigbee, PAN networks Network Security ○ ○ ○ HTTP / PHP connection / Servlets Routing Issues ○ ○ ● SNMP protocol / MIB structure Wireless and Mobile Networks ○ ○ ○ ○ Frame Relay and ATM Network Programming ○ ● ● LAN Design Issues ○ ○ ○ Network Management ○ WAN technologies ○ ● Overview Packet/Circuit/Cell switched Networks Data Link and Network Protocols ● ○ ○ ○ Security principles Principles of cryptology Message Integrity and Endpoint authentication Secure TCP connection (SSL) Network layer security Firewalls 2 Data Link Layer Issues: Framing ● Data-link layer provides service to network layer and it uses the service provided by the physical layer ● The physical layer accepts a raw bit stream and attempts to deliver it to the destination ○ ○ ○ The physical layer adds some redundancy to its signals to reduce the bit error rate However, bit stream received by the data link layer is not error free (changed values, different number of bits received) Data link layer detects the errors and even corrects them ● Usually, the data link layer breaks up the bit stream into discrete frames, computes a checksum for each frame and include it in the frame. The checksum is recomputed at destination to detect errors. 3 Data Link Layer Issues: Framing ● Breaking up the bit stream into frames is not trivial. ○ ○ It should be easy for a receiver to find the start of new frames It should use little of bandwidth ● There are four methods for framing: ○ ○ ○ ○ Byte count Flag bytes with byte stuffing Flag bits with bit stuffing Physical layer coding violations ( Example: Manchester Encoding, Using more bits than needed, using more levels than needed) 4 Framing: Byte Count ● Byte count method uses a field in the header to specify the number of bytes in the frame. ● The data link layer at destination sees the byte count and knows how many bytes follow and where the end of the frame is. ● This method is rarely used by itself 5 Framing: Byte Count ● ● ● ● The trouble with this method is that the count can be modified due to errors. Accordingly, the destination will get out of synchronization and it will be unable to locate the correct start of the next frame Even if checksum is incorrect and the destination knows that the frame is bad, it still has no way of telling where the next frame starts Ask for retransmission does not help since the destination does not know how many bytes to skip over to get to start of retransmission. 6 Framing: Flag Bytes with Byte Stuffing ● This method have each frame start and end with flag byte which is used as the starting and ending delimiter. In general, SOF and EOF can be different bytes or same. ● Two consecutive flag bytes indicate the end of one frame and the start of the next ● If the receiver ever loses synchronization, it can just search for two flag bytes to find the end of the current frame and the start of the next one 7 Framing: Flag Bytes with Byte Stuffing ● Problem: ○ It may happen that the flag byte occurs in the data, which will interfere with the framing ● Solution: Byte stuffing ○ ○ ○ The sender’s data link layer can insert a special escape byte (ESC) just before each flag byte in the data Framing flag byte can be distinguished from one in the data by the absence or presence of an escape byte before it The data link layer on the receiver end removes the escape bytes before giving the data to the network layer ● This method is a slight simplification of the approach used in PPP which is used to carry packets over communication links 8 Framing: Flag Bytes with Byte Stuffing 9 Framing: Byte Stuffing General ● In the previous slides, we used SOF = and EOF were the same, and were both equl to some byte, usually we use 7E = 01111110. But in general we can choose any 3 bytes to be SOF, EOF and Escape ● Byte stuffing: Use the following rules ○ ○ ○ ○ If SOF occurs in data, replace with Escape SOF If EOF occurs in data, replace with Escape EOF If Escape occurs in data, replace with Escape Escape SOF, EOF are not preceded by Escape at the start and end of Frame, respectively ● Example: ● Use SOF = <, EOF = >, Escape = \ ● show the transmitted frame if the data is : AB<<\CK\\z><\K> ● The transmitted Frame = <AB\<\<\\CK\\\\z\>\<\\K\>> ● Notice that the added green < amd > are the SOF and the EOF respectively. ● When the frame is received, it will b destuffed and we restore original data which is AB<<\CK\\z><\K> 10 Framing: Flag Bytes with Bit Stuffing ● Framing is done at bit level (frames contain an arbitrary number of bits made up of units of any size) ○ This gets around the disadvantage of byte stuffing which is that it is tied to the use of 8-bit bytes ● It was developed for HDLC protocol ○ ○ ○ ○ Each frame starts and ends with a flag byte of special pattern (01111110) Whenever the sender’s data link layer encounters five consecutive 1s in the data, it stuffs a 0 bit. This method ensures a minimum density of transitions Whenever the receiver finds five 1s followed by a 0 bit, it deletes the 0 ● USB (Universal Serial Bus) uses bit stuffing 11 Framing: Flag Bytes with Bit Stuffing 12 Byte and Bit Stuffing ● The main side-effect of byte and bit stuffing methods is that the length of a frame depends now on the content of the data frame it carries ● A frame of 100 bytes ○ ○ ○ can be carried in a frame of 100 bytes if there are no flags in the data can be carried in a frame of 200 bytes if the data consists solely of flag bytes and byte stuffing is used can be carried in a frame of a length increased by around 12.5% if the data consists solely of flag bytes and bit stuffing is used 13 Framing: Physical Layer Coding Violations ● This method uses a shortcut from the physical layer ● The use of reserved signals to indicate the start and the end of frames ○ using code violations to delimit frames ● By using reserved signals, it is easy to find the start and end of frames and there is no need to stuff data ● It is applicable to networks in which the encoding on the physical medium contains some redundancy ○ In such cases normally, a 1 bit is a high-low pair and a 0 bit is a low-high pair. The combinations of low-low and high-high which are not used for data may be used for marking frame boundaries. 14 Course Outline ● Wide Area Networks (WANs) ○ ○ ○ ● ● Framing Virtual LANs (VLANs) Ethernet/ Fiber Optics Cisco routing and Access Lists Exterior Gateway Protocols CDMA / WiFi Bluetooth and WiMAX Cellular Networks and Mobile IP 802.15.14: Zigbee, PAN networks Network Security ○ ○ ○ HTTP / PHP connection / Servlets Routing Issues ○ ○ ● SNMP protocol / MIB structure Wireless and Mobile Networks ○ ○ ○ ○ Frame Relay and ATM Network Programming ○ ● ● LAN Design Issues ○ ○ ○ Network Management ○ WAN technologies ○ ● Overview Packet/Circuit/Cell switched Networks Data Link and Network Protocols ● ○ ○ ○ Security principles Principles of cryptology Message Integrity and Endpoint authentication Secure TCP connection (SSL) Network layer security Firewalls 15 VLANs: Existing Shared LAN Configurations ● A Virtual LAN (VLAN) is a logical grouping of devices or users that can be grouped by function, department or application, regardless of their physical segment location. ● VLAN configuration is done at the switch via software. ● VLANs are not standardized and they require the use of proprietary software from the switch vendor. ● VLANs logically segment the physical LAN infrastructure into different subnets (or broadcast domains). Broadcast frames are switched only between ports within the same VLAN. 16 VLANs 17 Typical LAN ● Typical LAN is configured according to the physical infrastructure it is connecting. ○ ○ ○ ○ Users are grouped based on their location in relation to the hub they are plugged in to and how the cable is run to the wiring closet. The router interconnecting each shared hub typically provides segmentation and can act as a broadcast firewall (unlike segmentation provided by switches). This typical segmentation does not group users according to their workgroup association or their need for bandwidth. Users share the same segment and the same bandwidth despite their workgroup or department. 18 VLANs and Physical Boundaries VLAN technology is a costeffective and efficient way of grouping network users into virtual groups regardless of their physical location on the network. Switch ports and connected users can be grouped logically into defined workgroups: - co-workers in the same department - cross-functional product team - Diverse user groups sharing the same network application or software 19 LAN vs. VLAN Segmentation ● Main differences: ○ ○ ○ ○ ○ VLANs work at Layer 2 and Layer 3 of the OSI model Communication between VLANs is provided by Layer 3 routing VLANs provide a method of controlling network broadcasts The network administrator assigns users to VLANs VLANs can increase network security by defining which network nodes can communicate with each other 20 LAN vs. VLAN Segmentation Users are grouped on a single switch or on connected switches VLANs can span singlebuilding infrastructures, interconnected buildings or even WANs 21 The transport in VLANs ● It is important to transport VLAN information between interconnected switches and routers that reside on the corporate backbone ● Transport capabilities: ○ ○ ○ remove physical boundaries between users increase the configuration flexibility of a VLAN solution when users move provide mechanisms for interoperability between backbone system components 22 The transport in VLANs ● The backbone acts as the collection point for large volumes of traffic ● It carries end-user VLAN information and identification between switches, routers and and directly attached servers ● Within backbones, high-bandwidth, high-capacity links are typically chosen to carry the traffic. 23 Routers in LAN ● ● ● ● A router provides firewalls, broadcast management and route processing and distribution In VLAN, routers are used to provide connected routes between different VLANs. They also connect VLAN to a part of the network that is logically segmented with traditional subnet approach or require to access across a WAN Layer 3 communication is either embedded in the switch or provided externally. ○ Integration of external routers is done by using one or more high-speed backbone connections (like Fast Ethernet or ATM connections) ■ Increasing the throughput between switched and routers ■ Combine the overall number of physical router ports required for communication between VLANs 24 Frames in VLAN ● A switch in VLAN communications filter and forward decisions between switches and routers of the network by frame based VLAN metrics defined by network managers ● The logical grouping of users into VLANs is done by frame filtering and frame identification (frame tagging). ○ A frame is received or forwarded by a switch based on a set of rules defined by the administrator 25 Frame Filtering ● Frame filtering examines particular information about each frame. ● A filtering table is developed for each switch ○ this provides a high level of administrative control because a switch can examine many attributes of each frame ● A LAN switch can group users based on a station’s MAC address or protocol type. ● The switch compares the frames it filters with table entries and it takes the appropriate action based on the entries ○ This method is not scalable because each frame had to be referenced to a filtering table. 26 27 Frame Identification (tagging) ● Frame Tagging uniquely assigns a VLAN ID to each frame. ○ ● VLAN IDs are assigned to each VLAN in the switch configuration by the switch administrator ○ ● ● ● VLAN ID is a unique identifier added in the header of each frame as it is forwarded throughout the network backbone this method is a more scalable solution to VLAN deployment than frame filtering The ID is understood and examined by each switch prior to any broadcasts or transmissions to other switches, routers or end-station devices When the frame exits the network backbone, the switch removes the identifier before the frame is transmitted to the target end station Frame tagging functions at Layer 2 and requires little processing or administrative overheads. 28 29 VLAN Ports and Broadcast ● In a VLAN switch, each port can be assigned to a VLAN. Ports assigned to the same VLAN share broadcasts. ○ This improves the overall performance of the network ● There are three VLAN implementation methods to assign a switch port to a VLAN: ○ ○ ○ Port-centric Static Dynamic 30 PortCentric VLAN All nodes connected to ports in the same VLAN are assigned to the same VLAN ID Port-Centric facilitates the administrator's job: - Users are assigned by port VLANs are easily administered Increased security between VLANs Packets don’t leak on other domains 31 Static VLAN Advantages of static VLAns: - They are secure easy to configure straightforward to monitor Disadvantages: - They require the control and management of an administrator Ports on a switch are statically assigned to a VLAN. These ports maintain their assigned configurations until changed by the administrator 32 Dynamic VLAN VLANs are assigned based on a centralized VLAN management application. When a station is connected to an unassigned port, the switch checks the MAC address entry in the VLAN database. The switch dynamically configures the port with the corresponding VLAN configuration Switch ports can automatically determine their VLAN assignments. Dynamic VLAN functions are based on MAC addresses, logical addressing or protocol type of data 33 Dynamic VLAN Advantages: - - less administration within the wiring when a new user is added or moved centralized notification when unrecognized user is added Disadvantages: - More administration is required to set up database and to maintain an accurate database of all users Switch ports can automatically determine their VLAN assignments. Dynamic VLAN functions are based on MAC addresses, logical addressing or protocol type of data 34 Benefits of VLANs ● VLANs make user additions, moves and changes easier ○ ○ These changes are one of the network manager’s biggest headaches and largest expenses Many moves require cabling, and almost all moves require new station addressing and hub and router reconfigurations ● VLANs provide an effective mechanism for controlling these changes and reducing cost associated with hub and router reconfigurations ○ ○ ○ Users in the same VLAN share the same network address space regardless of their location When users in a VLAN are moved from one location to another (without changing VLAN and they are already connected to a switch port), their network addresses do not change. A location change can be as simple as plugging a user into a port on a VLAN-capable switch and configuring the port on the switch to that VLAN. 35 Broadcast in VLAN ● ● Broadcast frequency depends on types of applications, types of servers, the amount of logical segmentation and how network resources are used. Firewall segmentation is an effective measure against the problems of broadcast. ○ ○ Firewalls segment the network to prevent one segment from damaging other parts of the network It provides reliability and minimizes overheads of broadcast traffic Broadcasts (Layer 2 transmissions) can result from multimedia applications of faulty devices. They can bring down network. Broadcasts need boundaries 36 ● VLANs are effective mechanism for extending firewalls from the routers to switches in flat networks ○ ● A flat network has one broadcast domain across the entire network (no routers between switches) VLANs create firewalls by assigning switch ports or users to specific VLAN groups (within single switches or across multiple connected switches) ○ Broadcast traffic within one VLAN is not transmitted outside the VLAN 37 IEEE 802.1Q Standard The IEEE 802.1Q Standard was published in 1998 and it defines a new format to contain a VLAN tag. This format can be used with old format 802.3 in the same network based on available equipments 38 IEEE 802.1Q Standard IEEE 802.1Q frames are understood by VLAN-aware switches and the VLAN fields are filled by the first VLAN-aware switch to touch the frame. Legacy switches are moot regarding 802.1Q frames since such frames are not supposed to be sent to these switches. 39 IEEE 802.1Q Standard VLAN protocol ID has always the value 0x8100. All Ethernet cards recognize this field as a type rather than length (since this number is greater than 1500) 40 IEEE 802.1Q Standard The Tag is a 2-byte field that contains 3 subfields. 41 IEEE 802.1Q Standard Priority field (3 bits) is unrelated to VLANs. It is used to distinguish hard real-time traffic from soft real-time traffic from time-insensitive traffic in order to provide better quality of service over Ethernet. 42 IEEE 802.1Q Standard CFI (Canonical Format Indicator) was originally intended to indicate the order of bits in the MAC address. Now it is used to indicate that the payload contains an 802.5 frame that is hoping to find another 802.5 frame at the destination while being carried by Ethernet. 43 IEEE 802.1Q Standard VLAN identifier (low-order 12 bits) identifies the VLAN to which the frame belongs 44 VLANs and Network Security ● LANs are widely used and they have confidential, mission-critical data moving across them ● Confidential data requires security through access restriction ● LANs are easy to penetrate ○ A user plugged in to a live port can have access to all traffic within the segment. ● Network segmentation into multiple broadcast groups is a solution: ○ ○ ○ Restricts the number of users in a VLAN group Prevent another user from joining without first receiving approval from the VLAN network management application Configure all unused ports to a default low-service VLAN 45 VLANs and Network Security Restricted applications resources are grouped in a secured VLAN (a switch restricts access into the group based on station addresses, application types or protocol types) More security can be added by using access control lists 46 Course Outline ● Wide Area Networks (WANs) ○ ○ ○ ● ● Framing Virtual LANs (VLANs) Ethernet/ Optical Fiber Cisco routing and Access Lists Exterior Gateway Protocols CDMA / WiFi Bluetooth and WiMAX Cellular Networks and Mobile IP 802.15.14: Zigbee, PAN networks Network Security ○ ○ ○ HTTP / PHP connection / Servlets Routing Issues ○ ○ ● SNMP protocol / MIB structure Wireless and Mobile Networks ○ ○ ○ ○ Frame Relay and ATM Network Programming ○ ● ● LAN Design Issues ○ ○ ○ Network Management ○ WAN technologies ○ ● Overview Packet/Circuit/Cell switched Networks Data Link and Network Protocols ● ○ ○ ○ Security principles Principles of cryptology Message Integrity and Endpoint authentication Secure TCP connection (SSL) Network layer security Firewalls 47 LAN Issues: Broadcast Channels ● Network links can be divided into two categories: ○ ○ Networks using Point-to-Point connections (as in WANs excepts for satellite networks) Networks using broadcast channels (as in LANs and particularly wireless networks) ● Broadcast channels are referred to as multi-access channels or random access channels ○ The broadcast channel connects each user to all other users, and any user who makes full use of the channel interferes with other users who also wish to use the channel ● The MAC (Medium Access Control) protocols are used to solve the interference problem of broadcast channels. ○ MAC sublayer is the bottom part of the data-link layer. 48 Channel Allocation Problem ● This is the problem of allocating a single broadcast channel among competing users. ○ A channel can be a portion of wireless spectrum or a single wire or an optical fiber ● There are two methods of allocation: ○ ○ Static allocation Dynamic allocation 49 Static Channel Allocation ● The traditional way of static allocation of a single channel is the use of multiplexing schemes. ○ Divide the capacity of the channel among multiple competing users ● An example of multiplexing schemes is the Frequency Division Multiplexing (FDM) ○ ○ The bandwidth is divided into N equal-size portions (where N is the number of users). Each user has a private frequency band and there is no interference among users. ● When FDM is an efficient allocation mechanism? ○ When the number of users is small and constant and each of them has a steady stream or a heavy load of traffic ■ Example: FM radio stations 50 Static Channel Allocation ● Limitations of static allocation mechanism: ○ ○ When the number of senders is large and varying ■ If the spectrum is cut into N portions, some bandwidth will be wasted due to the fewer number of users who are currently interested in communication ■ If more than N users want to communicate, some of them will be denied access for lack of bandwidth even if there are some inactive users. the traffic is bursty (short and separate bursts of traffic) ■ An inactive user holds his portion of bandwidth and no one else is allowed to use it ■ Static allocation is inefficient because computer systems have usually bursty data traffic and usually most of the channels are idle most of the time. 51 Dynamic Channel Allocation ● Numerous dynamic channel allocation algorithms have been revised. ● ALOHA protocol (with or without slotting) is used in many derivatives in real systems (cable modems and RFID) ● Carrier Sensing is a technique that can be used when the state of the channel can be sensed. Using this technique, stations can avoid starting a transmission while another station is transmitting. ○ ○ This technique has led to a variety of CSMA protocols for LANs and MANs. It is the basis for classical Ethernet and 802.11 (wireless) networks. 52 IEEE 802.3 (Ethernet) ● Ethernet is the most appearing kind of computer networks in the world ● There are two kinds of Ethernet exist: ○ ○ Classic Ethernet ■ it is the original form of Ethernet and ran at rates from 3 to 10 Mbps ■ it solves the multiple access problem, it uses CSMA/CD Switched Ethernet (Still CSMA/CD) ■ switches are used to connect different computers ■ the current forms of Ethernet that are used nowadays ■ it runs at rates 100, 1000 and 10,000 Mbps ■ it runs in forms called fast Ethernet, gigabit Ethernet and 10 gigabit Ethernet 53 Classic Ethernet: Physical Layer Architecture of classical Ethernet(Obselete) There were two versions of classical Ethernet: thick and thin Ethernet. Each version has a maximum cable length per segment (500m for this, 200 for thin) and can handle a maximum number of machines. Usually up to 4 repeaters so thick can be up to 2000m. 54 Classic Ethernet: Physical Layer ● Each version of Ethernet has a maximum cable length per segment (i.e. unamplified length) over which the signal will propagate. ● Multiple cables in larger networks can be connected by repeaters. ○ A repeater is a physical layer device that receives, amplifies and retransmits signals in both directions ● The network is a series of cable segments connected by repeaters, over which the information was sent using the Manchester encoding. ○ ○ No two transceivers could be more than 2.5km apart and no path between any two transceivers could traverse more than four repeaters. These restrictions are done so that the MAC protocol would work correctly. 55 Classic Ethernet: MAC Sublayer Protocol ● ● Preamble contains the bit pattern 10101010 (with the exception of the last byte in which the last 2 bits are set to 11 to tell the receiver that the rest of the frame is about to start). In 802.3, the last byte is called Start Of Frame (SOF) The manchester encoding of this pattern produces 10-MHz square wave for 6.4µs to allow the receiver’s clock to synchronize with the sender. Ethernet IEEE 802.3 56 Classic Ethernet: MAC Sublayer Protocol ● ● The first transmitted bit of the Destination address (6 bytes) is a 0 for ordinary address and 1 for group address (multicasting) - group addresses allow multiple stations in a group to listen to a single address - it requires group management to define which stations are in the group Special address of all 1 bits is reserved for broadcasting (FF FF FF FF FF FF). Ethernet IEEE 802.3 57 Classic Ethernet: MAC Sublayer Protocol ● Source addresses (6 bytes) are globally unique addresses assigned by IEEE - the first 3 bytes of the address are used for an OUI (Organizationally Unique Identifier). Values are assigned by IEEE and indicate a manufacturer - the last 3 bytes are assigned by the manufacturer who programs the complete address into the NIC before it is sold. Ethernet IEEE 802.3 58 Classic Ethernet: MAC Sublayer Protocol ● ● Type field in Ethernet frame tells the receiver what to do with the frame (which process to give the frame to) - Example: type code 0x0800 means that the data contains an IPv4 packet In 802.3, this field indicates the length of the frame so as to prevent a layering violation - Since Ethernet length was determined by looking inside data Ethernet IEEE 802.3 59 Classic Ethernet: MAC Sublayer Protocol ● Both fields are accepted by IEEE. - All type fields in use have values greater than 1500 (maximum length of data) - Any number less than or equal to 1500 (0x600) can be interpreted as Length - Any number greater than 1500 (0x600) can be interpreted as Type - Checksum is CRC Ethernet IEEE 802.3 60 Classic Ethernet: MAC Sublayer Protocol ● ● Data field is up to 1500 bytes (maximum frame length). A minimum frame length is set to 46 bytes of data (a total of 64 bytes from destination address to checksum including both) - It is necessary to distinguish valid frames from garbage (due to collisions) To prevent a station from completing the transmission of a short frame before the first bit has even reached the far end of the cable where it may collide with another frame Ethernet IEEE 802.3 61 Classic Ethernet: Minimum Frame Size Collision detection can take as long as 2𝝉, which requires a minimum frame length to ensure that the sender is still transmitting in order to detect the collison. The approcimate derivation above shows that Minimum Frame Size, Bit Rate, and Maximum distance between Computers are related. 62 Ethernet: Min Frame size ● ● ● ● ● ● From the derivation in the previous slide =>Min Frame size = K * d * Bit-rate In10 Mbit Ethernet, Bit-Rate = 10 Mb/s, d = 2000 m( or 2500m). Repeaters delay should be added, we ignored them in the derivation The Min Frame Size = 64 bytes including header => Min Data = 64 bytes, hence we use padding if data < 64 bytes. In 100Mbit Ethernet Bit-Rate = 100 Mb/s, the distance was reduced to 200m hence MinFrame Size Remains 64 bytes. If we keep it 2000m then MinFrame Size should be 640bytes. But the attenustion increases with Frequency and 2000m is not practical. In Giga bit Ethernet , Bit-Rate = 1000Mb/s, if we keep the Maximum 200m, distance => Min Frame size = 640 bytes or we use Max distance = 20m and keep min Frame size = 64 byte. But 20m is not practical. So they decided to keep the max distance to 200m and increase the Minimum frame size to around 600 byte. 63 Ethernet: Min Frame size ● So In 1Giga bit Ethernet Max distance = 200 m, Min Frame size should around 64*10 ● 1Giga bit: In Fiber Networks they use Min Frame Size = 416 byte and 520 in Wired Netwoeks Network 10 Mbit 100 Mbit 1000 Mbit Giga Max Distance between 2 Computers (Twisted pair) 2000m (old coax) 200 m new cat3 200 m cat 5 200 m Cat 5e More in Fiber Max Distance to Switch (Twisted Pair) 100 m 100 m 100 m Cate 5e Min Frame Size 64 byte 64 byte 520 byte for 1000 base T 416 bye In 1000 base X 64 Classic Ethernet: MAC Sublayer Protocol ● Pad field is used to fill out the frame to the minimum size - This happens if the data portion of a frame is less than 64 bytes Ethernet IEEE 802.3 65 Classic Ethernet: MAC Sublayer Protocol ● Checksum fields is a 32-bit CRC - It is an error-detecting code that is used to determine if the bits of the frame have been received correctly If an error is detected in a frame, the frame is dropped Ethernet IEEE 802.3 66 Classic Ethernet: CSMA/CD ● Classic Ethernet uses 1-persistent CSMA/CD ○ ○ ○ ○ A transmitter senses the medium when it has frames to send. It sends data as soon as the medium becomes idle If there is a collision, transmitters abort transmission with a short jam signal and retransmits after a random interval If there is no collision, the sender assumes that the frame was probably successfully delivered. Neither CSMA/CD nor Ethernet provides acknowledgments ■ This choice is appropriate for wired and optical fiber channels that have low error rates. Wireless channels have more errors and hence, acknowledgments are used 67 Switched Ethernet ● Switched Ethernet has wiring pattern in which each station has a dedicated cable running to a central hub (Obselete) ○ ○ Instead of the single long cable architecture of classic Ethernet. Switched Ethernet architecture solved the problems of classic Ethernet architecture, such as finding breaks or loose connections ● Hubs do not increase capacity and Ethernet network can become saturated ○ A hub is equivalent to the single cable of classic Ethernet (equivalet to Coaxial cable = Bus) 68 Switched Ethernet ● A switch deals with the problem of increased load. ● It contains a high-speed backplane that connects all of the ports ● Unlike hubs, a switch only outputs frames to the ports for which those frames are destined ○ ○ ○ When a switch port receives an Ethernet frame from a station, the switch checks the Ethernet addresses to see which port the frame is destined for The switch forwards the frame over its high-speed backplane to the destination port Other ports on the switch do not know about this frame ● All configurations use point-to-point links. 69 Switched Ethernet: Collisions ● If more than one station send data at the same time: ○ ○ In a hub, all stations are in the same collision domain ■ They must use the CSMA/CD algorithm to schedule their transmissions In a switch, each port is its own independent collision domain ■ If the cable is full-duplex, both station and port can send data at the same time without worrying about other stations or ports. No CSMA/CD is needed ■ If the cable is half-duplex, the station and the port must contend for transmission using CSMA/CD Full-Duplex Mode 70 Switched Ethernet: Hub vs Switch ● A switch improves performance over a hub in two ways: ○ ○ There are no collisions when a switch is used unless it is broadcst or two try to send to the same destination. Then the capacity is used more efficiently Multiple frames can be sent simultaneously (by different stations) ■ These frames will reach the switch ports and travel over the switch’s backplane to be output on the proper ports. ■ Switch has buffering so that it can temporarily queue an input frame until it can be transmitted to the output port (if two frames are sent to the same output port) ● Network is more secure when switches are used rather than hubs ○ ○ With a hub, every computer that is attached can see the traffic sent between all of the other computers With a switch, traffic is forwarded only to the ports where it is destined 71 Fast Ethernet (IEEE 802.3u) ● Fast Ethernet is developed to get faster LANs ● It is backward compatible with Ethernet ● Basic information: ○ ○ keep all old frame formats, interfaces and procedural rules of Ethernet Reduce the bit time from 100ns (1/10Mbps) to 10ns (100Mbps) 72 Fast Ethernet (IEEE 802.3u) ● ● A Category 3 twisted pairs can carry 10 Mbps with 100m, but it is unable to carry 100 Mbps within the same distance 100Base-T4 is a Category 3 UTP scheme ○ ● It used a signaling speed of 25 MHz, which is 25% faster than standard Ethernet (Manchester Encoding requires two clock periods for each sent bit) 100Base-T4 requires 4 twisted pairs. Half Duplex ○ One is always to the hub ○ One is always from the hub ○ Two are switchable to the current transmission direction 73 Fast Ethernet (IEEE 802.3u) ● 100Base-TX Ethernet is used based on Category 5 UTP ○ It dominated the market for Fast Ethernet since it can 100 Mbps transmission over a 100m easily with a simple design ○ Two twisted pairs per station are used and they can handle clock rates of 125 MHz ■ ○ It uses 4B/5B encoding instead of Manchester encoding ■ ○ One to the hub and one from it 4 data bits are encoded as 5 signal bits and sent at 125 Mbit to provide 100 Mbps The 100Base-TX is full duplex ■ Stations can transmit at 100 Mbps on one twisted pair and receive at 100 Mbps on another twisted pair at the same time 74 Fast Ethernet (IEEE 802.3u) ● 100Base-FX uses two strands of multimode fiber (one for each direction) ● It can run full duplex with 100 Mbps in each direction ● The distance between a station and the switch can be up to 2 km 75 Physical Limitations of Fast Ethernet ● Since Fast Ethernet allows interconnection by either hubs or switches, CSMA/CD continues to work and the relation between the minimum frame size and maximum cable length must be maintained when speed goes from 10 Mbps to 100 Mbps ○ ○ Either the minimum frame size of 64 bytes must go up Or the maximum cable length of 2500m must come down ● The easiest solution (and the applied one) is to reduce the maximum cable length between any two stations by a factor of 10 76 Fast Ethernet and Backward Compatibility ● Fast Ethernet was quickly deployed by many users, but some users kept their old 10 Mbps Ethernet cards installed. ● Fast Ethernet can handle virtually a mix of 10Mbps and 100Mbps stations. ● Auto-Negotiation is a mechanism that lets two stations automatically negotiate the optimum speed (10 or 100 Mbps) and duplexity (half or full) ● It works well most of the time but it is known to lead to duplex mismatch problems when one end of the link auto-negotiates but the other one does not and is set to full-duplex mode ● Most Ethernet products use this feature to configure themselves 77 Gigabit Ethernet (IEEE 802.3ab) ● ● Gigabit Ethernet is a faster Ethernet than Fast Ethernet All configurations used point-to-point links (each Ethernet cable has exactly two devices on it). Two-station Ethernet Multistation Ethernet 78 Gigabit Ethernet: Duplexing ● Like Fast Ethernet, Gigabit Ethernet supports two different modes of operation: ○ Full-duplex mode (normal mode) which allows traffic in both directions at the same time ■ It is used when a central switch is used. ■ All lines are buffered so each computer and switch is free to send frames whenever it wants to ■ The sender does not have to sense the channel before transmission since contentions are impossible ■ The CSMA/CD protocol is not necessary to be used ■ The maximum length of the cable is limited by the signal strength issues rather than by how long it takes for a noise burst to propagate back to the sender in the worst case ■ Auto-negotiation is available (choices are 10, 100 and 1000 Mbps) 79 Gigabit Ethernet: Duplexing ○ Half-duplex mode is used when computers are connected to a hub rather than a switch ■ Hubs do not buffer incoming frames but it connects electrically all the lines internally. ■ When hubs are used, collisions are possible so the CSMA/CD protocol is necessary ● When CSMA/CD is used on wire CX gigabit Ethernet, the maximum length should drop to 25m instead of 2500m in classic Ethernet. ● Two features are added to increase the maximum cable length to 200m: ○ ○ Carrier extension: the hardware adds its own padding after the normal frame to extend the frame to 512 bytes (instead of 64 bytes). The padding is added and removed by the hardware without any changes done at software Frame bursting: allows the sender to transmit a concatenated sequence of multiple frames in a single transmission. If the total burst is less than 512 bytes, the hardware pads it again. 80 Gigabit Ethernet Cabling ● ● gigabit Ethernet supports both copper and fiber cabling Signaling at or near 1 Gbps requires encoding and sending a bit every nanosecond ○ The 8B/10B encoding is used, which encodes 8 bits of data into 10-bit codewords that are sent over the wire or fiber. The codewords are chosen so that they could be balanced (have the same number of 0s and 1s) with sufficient transitions for clock recovery 81 MAC Frame with Gigabit Carrier Extension 82 Minimu Frame Size, Distance, and Wiring 520 bytes applies to 1000Base-T implementations. The minimum frame size with extension field for 1000Base-X is reduced to 416 bytes because 1000Base-X encodes and transmits 10 bits for each byte 83 Gigabit Frame-Burst Sequence Burst mode is a feature that allows a MAC to send a short sequence (a burst) of frames equal to approximately 5.4 maximum-length frames without having to give up control of the medium. The transmitting MAC fills each interframe interval with extension bits, so that other stations on the network will see that the network is busy and will not attempt transmission until after the burst is complete. 84 Gigabit Frame-Burst Sequence If the length of the first frame is less than the minimum frame length, an extension field is added to extend the frame length to the minimum value. Subsequent frames do not need extension fields, and a frame burst may continue as long as the burst limit has not been reached. If the burst limit is reached after a frame transmission has begun, transmission is allowed to continue until that entire frame has been sent. 85 Data Transmission ● Physical limits of a transmission system: ○ ○ Propagation delay: time required for a segment to travel across media bandwidth: maximum times per second a signal can change ● Network hardware encodes information for transmission ● There are two types of encoding: ○ ○ Analog: the value of energy proportional to the amount of data sent Digital: two forms of energy to encode (0 and 1) ■ Digital encoding is the one used in computer networks 86 Digital Encoding: Example ● Medium: ○ Copper wire ● Energy Form: ○ Electrical current ● Encoding: ○ ○ Negative voltage encodes 1 Positive voltage encodes 0 87 Digital Encoding: RS-232C Standard ● Example uses: ○ ○ Connection to keyboard/mouse Serial port on PC ● Voltage is +15 or -15 ● Cable limited to around 50 feet (around 15 m) ● Uses Asynchronous communication 88 Asynchronous Communication ● Sender and receiver must agree on ○ ○ Number of bits per character Duration of each bit ● Receiver ○ ○ Does not know when a character will arrive May wait forever ● To ensure meaningful exchange send ○ ○ Start bit before character One or more stop bits after character 89 Illustration of RS-232 ● Start bit: same as 0 (not part of data) ● Stop bit: same as 1 (Follows data) 90 Duration of Bit in RS-232C ● Duration of bit is determined by baud rate ○ ○ Typical baud rates: 9.6 Kbaud, 14.4 Kbaud and 28.8 Kbaud Duration of 1 bit is 1/ baud-rate ● Sender and receiver must agree a priori ● Receiver samples signal ● Disagreement results in framing error 91 RS-232C: Two Way Communication ● ● ● ● Communication is full-duplex, which is desirable in practice Transmitter on one side connected to receiver on other Separate wires needed to carry current in each direction DB-25 connector used: ○ ○ Pin 2 is transmit Pin 3 is receive 92 Distorted Signal for a Single Bit ● RS-232 hardware must handle minor distortions ○ ○ Take multiple samples per bit Tolerate less than full voltage ● Cannot use electrical current for long-distance transmission ○ An oscillating signal travels farther than direct current ● For long-distance communication: ○ ○ Send a sine wave (carrier wave) Change (modulate) the carrier to encode data 93 Illustration of a Carrier ● Carrier: ○ Usually a sine wave and it oscillates continuously ● Fixed frequency of carrier 94 Types of Modulation ● Amplitude modulation (used in AM radio) ● Frequency modulation (used in FM radio) ● Phase-Shift modulation (used for data) 95 Amplitude Modulation ● Strength of signal encodes 0 or 1 ● One cycle of wave needed for each bit ● Data rate limited by carrier bandwidth 96 Phase-Shift Modulation ● Change in phase encodes K bits ● Data rate higher than carrier bandwidth 97 Phase-Shift Example ● Section of wave is omitted at phase shift ● Data bits determine size of omitted section 98 Modem ● Hardware device ● Used for long-distance communication ● Contains separate circuitry for ○ ○ Modulation of outgoing signal Demodulation of incoming signal ● Modem stands for Modulator/Demodulator 99 Modems Used Over a Long Distance ● One modem at each end ● Separate wires carry signals in each direction ● Modulator on one modem connects to demodulator on other 100 Types of Modems ● Conventional ○ Use four wires and transmit modulated electrical wave ● Optical ○ Use glass fiber and transmit modulated light ● Wireless ○ Use air/space and transmit modulated RF wave ● Dialup ○ Use voice telephone system and transmit modulated audio tone 101 Dial-Up Modem ● Modem can ○ ○ Dial Answer ● Carrier is audio tone 102 Maximum Data Rate of a Channel ● The nature of the physical layer imposes two fundamental limits on all channels, and these determine their bandwidth: ○ ○ The Nyquist limit, which deals with noiseless channels ■ Henry Nyquist realized that even a perfect channel has a finite transmission capacity The Shannon limit, which deals with noisy channels ■ Claude Shannon carried Nyquist’s work further and extended it to the case of a channel subject to random noise 103 Nyquist’s Theorem ● Nyquist proved that if an arbitrary signal has been run through a low-pass filter of bandwidth B, the filtered signal can be completely reconstructed by making only 2B (exact) samples per second. ○ Sampling the line faster than 2B times is pointless, since the higher-frequency components that such sampling could recover have already been filtered out ● If the signal consists of V discrete levels, Nyquist’s theorem states: maximum data rate = 2B log2V bits/sec 104 Nyquist’s Theorem: Applications ● For RS-232 ○ ○ The number of discrete levels V is only 2, because RS-232 uses two values only (+15,-15 volts) to encode data bits Data rate = 2 * B * log22 = 2B ● For Phase-Shift encoding ○ ○ Suppose it has 8 discrete levels (possible shifts) Data rate = 2 * B * log28 = 6B 105 Nyquist’s Theorem ● Example: ○ A noiseless 3-KHz channel of two levels have a maximum data rate of: maximum data rate = 2B log2V bits/sec maximum data rate = 2 * 3,000 * log22 = 6,000 bps 106 Shannon’s Theorem ● Shannon’s theorem considers the presence of random noise in channels ● According to physics, real systems emit and absorb energy (thermal). Unwanted energy is called noise ○ Random (thermal) noise is due to the motion of the molecules in the system ● The amount of thermal noise present is measured by the ratio of the signal power to the noise power, called SNR (Signal-to-Noise Ratio) ○ Usually the ratio is expressed on a log scale 107 Shannon’s Theorem ● According to Shannon’s theorem, the maximum data rate (or capacity) of a noisy channel whose bandwidth is B Hz and whose signal-to-noise ratio is S/N, is given by: maximum number of bits/sec = B log2 (1+S/N) *** This data rate describes the best capacities that real channels can have. 108 Shannon’s Theorem: Modem Example ● Conventional telephone system: ○ ○ ○ ○ Engineered for voice Bandwidth (B) is 3000 Hz Signal-to-Noise Ratio (SNR) is approximately 1000 Effective capacity is Data rate = 3000 * log2(1+1000) ≅ 30,000 bps ● Conclusion ○ Dial-up modems have little hope of exceeding 28.8 Kbps , for B = 3K. For countries that limit B=4K Hz. Maximum Data Rate = 40 Kbps 109 Shannon’s Theorem: ADSL Example ● ADSL provides internet access over normal telephone lines. ○ ○ ○ ○ It uses a bandwidth of around 1 MHz. The SNR depends strongly on the distance of the home from the telephone exchange (an SNR of around 40 dB for short lines of 1 to 2 km is very good) With these characteristics, the channel can never transmit much more than 13 Mbps, no matter how many or how few signal levels are used, and no matter how often or how infrequently samples are taken. For ADSL to exceed 13 Mbps, it must either: ■ improve the SNR (for example by inserting digital repeaters in the lines closer to the customers) ■ or use more bandwidth (like the evolution to ADSL2+) 110 Conclusion: Nyquist vs Shannon ● Nyquist’s theorem means that finding a way to encode more bits per cycle improves the data rate ● Shannon’s theorem means that no amount of clever engineering can overcome the fundamental physical limits of a real transmission system 111 Nyquist and Shannon Example ● Consider a communication channel with Band width 5MHz and S/N = 511 (around 500), answer the following questions: 1. Compute the Capacity of the Channel which is the Maximum Possible Bit Rate 2. What is the Bit Rate if we use 8 levels of Encoding. 3. What is the Maximum Possiblle Level K such that n bits can be encoded where 2n = K. Where n is Integer. ● Solution : 1. Use Shannon. Capacity = maximum bit Rate bits/sec = B log2 (1+S/N) = 5M log2 (1+511) = 5*9 = 45M bit/sec 2. use Nyquist and Make sure Bit Rate is less than Capacity What is the Bit Rate if we use 8 levels of Encoding. 3. Bit Rate = 2B log2 (Levels) = 2*5 log2 (8) = 30 Mbps which is less than 45Mbps(baud rate = 2B= 10M baud) 2B log2 (Levels) = B log2 (1+S/N) => Levels = sqrt(1+S/N) = 22.62 , since we want power of 2 ➔ Levels = 16 ➔ n= 4. Use 16 levels where each encode 4 bits. It is possible to use More levels up to 22 and these levels can be used for error detection, correction and encoding of SOF, EOF if desired. 112 Ethernet Physical Layer ● The naming convention of any Ethernet product is a concatenation of three terms indicating: ○ ○ ○ The transmission rate The transmission method The media type/signal encoding ● For example: ○ ○ ○ ○ 10Base-T 100Base-T4 100Base-TX 1000Base-LX → 10Mbps, baseband, over two twisted-pair cables → 100Mbps, baseband, over two twisted-pair cables → 100Mbps, baseband, over four twisted-pair cables → 1000Mbps, baseband, long wavelength over optical fiber cable 113 Ethernet Physical Layer ● In Ethernet, the middle term always seems to be “Base”. ● Early versions of protocol also allowed for broadband transmissions (example, 10Broad) ○ Broadband uses analog signals in the form of optical or electromagnetic waves over multiple transmission frequencies. ● The broadband implementations were not successful in marketplace ● Hence, all current Ethernet implementations use baseband transmissions ○ Baseband uses digital signaling over a single wire, and the transmission takes form of either electrical pulses or light 114 Twisted-Pair Cable ● It consists of two insulated copper wires that are twisted together in a helical form ○ Twisting is necessary because two parallel wires constitute a finite antenna. When wires are twisted, waves from each cancel out, so the wire radiates less effectively. Category 5 UTP cable with 4 twisted pairs 115 Twisted-Pair Cables ● Category 3 cables are replaced by Category 5 cables ○ ○ ● ● Cat.5 has more twists per meter. More twists result in less crosstalk and better-quality signal over longer distances. Hence, Cat.5 is more suitable for high-speed computer communications Category 5 cabling consists of two insulated wires gently twisted together. Four such wires are grouped in a plastic sheath to protect the wires and keep them together. Cat.6 and Cat.7 have more stringent specifications to handle signals with greater bandwidths. Category 5 cable 116 Coaxial Cable ● ● ● ● It has better shielding and greater bandwidth than twisted pairs It can span longer distances at higher speeds It has good combination of high bandwidth and excellent noise immunity Two types: ○ ○ 50-ohm cable: usually for digital transmission. 75-ohm cable: usually for analog transmission and cable television. 117 10Base-T ● It provides Manchester-encoded 10-Mbps bit-serial communication over two unshielded twisted-pair cables. ● In Manchester encoding, each pulse is clearly identified by the direction of the mid-pulse transition rather than by its sampled level value. ● Manchester encoding introduced some difficult frequency-related problems that make it unsuitable for use at higher data rates. 118 10Base-T ● ● It uses two pairs of a four-pair category 3 or 5 cable. One for sending ad one for receiving Each pair is configured as a simplex link ○ ● ● Simplex link allows transmission in one direction only 10Base-T physical layers can support either half-duplex or full-duplex operation. Full Duplex is supported by using one pair for sending and one pair for Receiving 119 100Mbps-Fast Ethernet ● Ethernet versions with different encoding requirements and a different set of media-dependent sublayers: ○ ○ ○ 100Base-T4 (1995) 100Base-TX (1995) 100Base-T2 (97). Research, never commercialized 120 100Base-T4 ● ● ● ● ● It allows 10Base-T networks to be upgraded to 100Mbps operation without the need of changing the existing Cat.3 UTP cables to Cat.5 cables It uses the the same precedent signal transmission procedure (2 simplex and 2 half-duplex) Full-duplex is unsupported on 100Base-T4. Bit rate /pair = 100/3 = 33.3 Mbps. Baud rate /pair= 33.33 *6/8 = 25M baud 121 100Base-T4: 8B6T Encoding ● ● ● 8B6T encoding maps each 8-bit binary byte into a pattern of 6 ternary (three-level: +, 0, -) symbols known as 6T codegroups 6T gives 36 = 729 values, we need only 256. Separate code-groups are used for IDLE and SOF, EOF=>no bit or byte stuufing, control code-groups. Data (Hex) (Binary) 8B6T Code 00 0000 0000 +-00+- 01 0000 0001 0+-+-0 ... ... ... FE 1111 1110 -+0+00 FF 1111 1111 +0-+00 122 100Base-T4: 8B6T Encoding ● ● ● 8B6T encoding maps each 8-bit binary byte into a pattern of 6 ternary (threelevel: +, 0, -) symbols known as 6T code-groups 6T gives 36 = 729 values, we need only 256. Separate code-groups are used for IDLE and SOF, EOF=>no bit or byte stuufing, control codegroups. 123 100Base-T4: 8B6T Encoding ● ● ● During transmission, 6T code-groups are transmitted in a delayed round-robin sequence over the 3 wires Each frame is encapsulated with Start-of-Stream and End-of-Stream code-groups. Receipt of a non-IDLE code-group over the dedicated receive-pair any time before the collision window expires indicates that a collision has occurred. 124 100Base-X(100Base-TX) ● It supports transmission over either two pairs of Category 5 UTP copper wire or two ● ● strands of optical fiber. Full Duplex is Supported by using one pair for sending and one pair for Receiving. The 100Base-X uses the 4B/5B encoding ○ Each 4-bit data nibble (representing half of a data byte) is mapped into a 5-bit binary codegroup that is transmitted bit-serial over the link ● The 32 5-bit code-groups are divided as (See Table Next page): ○ ○ ○ ○ 16 possible values in a 4-bit data nibble 4 control code-groups transmitted as pairs (Start of Stream, End of Stream) 1 special IDLE code-group that is continuously sent during interframe gaps to maintain continuous synchronization between NICs 11 invalid code-groups. If any is included in the transmission, the frame is treated as invalid 125 100Base-X: 4B/5B Encoding Table. 126 100Base-X: Stream with Frame Encapsulation 127 100Base-T2 ● It is a better alternative for upgrading networks with installed Cat.3 cabling ● It uses dual-duplex baseband transmission method to send encoded symbols simultaneously in both directions on both wire pairs. ● Was developed in 1997. Research only. Never comercialized 128 100Base-T2 (Full Duplex Operation) ● Because the signal on each wire pair at the MDI (Medium Interface) is the sum of the transmitted signal and the received signal, each receiver subtracts the transmitted symbols from the signal received at the MDI to recover the symbols in the incoming data stream. The incoming symbol pair is then decoded, unscrambled, and reconstituted as a data nibble for transfer to the MAC. ● Was not commercialized. But Ideas were used in Giga bit Ethernet 129 100Base-T2: PAM5 Encoding ● First, data frame nibbles is scrambled to randomize the bit sequence ● PAM5 (Pulse Amplitude Modulated) maps the two upper bits and the two lower bits of each nibble into 5-level (+2, +1, 0, -1, -2) PAM symbols. ● The mapped nibbles are transmitted simultaneously over the two wire pairs (PAM5x5) ● Scrambling of data ensures that the data streams traveling in opposite directions on the same wire pair are uncoordinated 130 100Base and 10Base Table Values for bit and Baud rate are per pair 131 1000Base-T ● It scrambles each byte in the MAC frame to randomize the bit sequence before it is encoded using 4 PAM5 symbols ● The PAM5 symbols are sent at the same time over 4 wire pairs ● 4 of the 5 levels in each PAM5 symbol represent 2 bits in the data byte ● The 5th level is used for FEC (Forward Error Correction) coding ○ This enhances symbol recovery in the presence of noise and crosstalk 132 1000Base-T • 1000Base-T supports full-duplex operations and of course half duplex. • Full-duplex: Because the signal on each wire pair at the MDI (Medium Interface) is the sum of the transmitted signal and the received signal, each receiver subtracts the transmitted symbols from the signal received at the MDI to recover the symbols in the incoming data stream. The incoming symbol pair is then decoded, unscrambled, and reconstituted as a data nibble for transfer to the MAC. 133 1000Base-T Cat 5e STP or FTP 134 1000Base-X ● It supports full-duplex binary transmission over two strands of optical fiber or two STP cables. ○ It supports as well half-duplex operation ● It uses 8B/10B encoding scheme ○ Each 8-bit data byte is mapped into a 10-bit code-group for bit-serial transmission ● Each frame is encapsulated at physical layer ● Link synchronization is maintained by sending a continuous stream of IDLE code-groups during interframe gaps 135 1000Base-X ● It supports full-duplex binary transmission over two strands of optical fiber or two STP cables. ○ It supports as well half-duplex operation ● It uses 8B/10B encoding scheme ○ Each 8-bit data byte is mapped into a 10-bit code-group for bit-serial transmission 136 Fiber Optics ● A high-speed transmission medium with clear signal ● The current practical limit of bandwidth of fiber optics is 100 Gbps ○ The achievable (theoretical) bandwidth with fiber technology is in excess of 50,000 Gbps (50 Tbps). This limits are unreachable due to the inability to convert between electrical and optical signals any faster ● To build higher-capacity links, many channels are simply carried in parallel over a single fiber. ● Fiber optics are used for long-distance transmission in network backbones ○ As in high-speed LANs and high-speed Internet access such as FttH (Fiber to the Home) 137 Fiber Optics ● An optical transmission has three components: ○ ○ ○ The light source ■ A pulse of light indicates a 1 bit and the absence of light indicates a 0 bit The transmission medium ■ It is an ultra thin fiber of glass The detector ■ It generates an electrical pulse when light falls on it ● By attaching a light source to one end of an optical fiber and a detector to the other, we have a unidirectional data transmission system that accepts an electrical signal, converts and transmits it by light pulses, and then reconverts the output to an electrical signal at the receiving end 138 Fiber Optics ● In this transmission system, the light should not leak and be useless. ○ ○ ○ ○ If a light ray passes from one medium to another, the ray is bent at the boundary. The amount of refraction depends on the properties of the two media If the angles of incidence are above a certain critical value, the light is refracted back into the silica and none will escape into the air (trapped inside the fiber). The light inside the fiber can propagate for many kilometers with virtually no loss 139 Fiber Optics: Modes ● Multi-mode fiber ○ ○ Any light ray incident on the boundary above the critical angle will be reflected internally Many different rays can be sent with different angles ● Single-mode fiber ○ ○ ○ The fiber’s diameter is reduced to a few wavelengths of light Hence, the fiber acts like a wave guide and the light can propagate only in a straight line without bouncing It is more expensive and used for longer distances ■ data transmission at 100 Gbps for 100 km without amplification 140 Transmission of Light Through Fiber ● Optical fiber is made of glass that is transparent enough for the light to shine through ● The attenuation of light through glass is defined as the ratio of input to output signal power ● The attenuation of light depends on: ○ ○ the wavelength of the light the physical properties of the glass 141 Transmission of Light Through Fiber 0.85 band has higher attenuation and is used for shorter distances. But at this wavelength, lasers and electronics are made of the same material. These two bands have good attenuation properties (less than 5% loss per kilometer) The attenuation of light through fiber in the infrared region 142 Fiber Cables ● Fiber cables are almost like coaxial cables except for the braided outer conductor. ● The center is the fiber core through which the light propagates ○ ○ In multimode fibers, the core is typically 50 microns in diameter In single-mode fibers, the core is 8 to 10 microns ● The cladding glass is used to keep all the light in the core ● The plastic jacket is used to protect the cladding 143 Fiber Cables ● Fiber is normally grouped in bundles protected by an outer sheath ● Fibers are connected in three ways: ○ ○ ○ using fiber sockets. ■ Connectors lose about 10-20% of the light but they make it easy to reconfigure using mechanical splices to attach two connectors by using a special sleeve ■ about 10% of light loss by melting two connectors together to form a solid connection ■ small amount of attenuation occurs 144 Light Sources ● There are two types of light sources: ○ ○ LED (Light Emitting Diode) Semiconductor lasers(ILD: Injection Laser Diode) ● The receiving end is a photodiode ○ The response time of photodiode limits the data rate to about 100 Gbps 145 Optical Fiber vs. Copper Wire ● Advantages of optical fiber over copper wires ○ ○ ○ ○ ○ ○ It can handle much higher bandwidths than copper It has low attenuation, so less repeaters are needed ■ repeaters every 50 km versus every 5 km for copper It is not affected by electromagnetic interference, power failures and corrosive chemicals It is thin and lightweight ■ 1000 twisted-pair wires 1 km long weight 8000 kg ■ two fiber optics have more capacity than the 1000 twisted pairs and they weight 100 kg Lower costs regarding support systems to maintain them and lower installation costs of new routers More Secure. No induced EMF. 146 Optical Fiber vs. Copper Wire ● Advantages of copper wire over optical fiber ○ ○ ○ ○ ○ Fiber is a less familiar technology requiring skills not all engineers have Fiber can be damaged easily by being bent too much Optical transmission is unidirectional ■ Two-way communication requires either two optical fibers or two frequency bands on one fiber Fiber interfaces cost more than copper interfaces More Secure 147 1000-X (SX, LX, CX) Ethernet 148 1000 Base-X Ethernet Multimode and Single Mode Fiber 149